A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Confidential Signatures and Deterministic Signcryption
[chapter]
2010
Lecture Notes in Computer Science
We give formal security models for deterministic signcryption schemes for high-entropy and low-entropy messages, and prove encrypt-and-sign to be secure for confidential signature schemes and high-entropy ...
Finally, we show that one can derandomize any signcryption scheme in our model and obtain a secure deterministic scheme. ...
Acknowledgements The authors wish to thank the ECRYPT II MAYA working group on the design and analysis of primitives and protocols for interesting preliminary discussions on this topic. ...
doi:10.1007/978-3-642-13013-7_27
fatcat:uyq6c7vdl5bm5ofpjujwsnsbx4
Efficient Signcryption Without Random Oracles
[chapter]
2006
Lecture Notes in Computer Science
Signcryption is an asymmetric cryptographic method that simultaneously provides confidentiality and authenticity at a lower computational and communication overhead. ...
The scheme is also efficient and comparable to the state-of-the-art signcryption schemes from pairings that is secure in the random oracle model. ...
Under the q-Strong Diffie-Hellman (q-SDH) assumption and a candidate Double Decision Diffie-Hellman (DDDH) assumption, the confidentiality and authenticity of the signcryption scheme are proven without ...
doi:10.1007/11839569_43
fatcat:kocpimbqvvgc3k65rv63j3v5a4
Hybrid Signcryption Schemes with Insider Security
[chapter]
2005
Lecture Notes in Computer Science
That paper also demonstrated that the basic hybrid construction formalised by Cramer and Shoup [5, 9] is incapable of producing a signcryption scheme with insider security. ...
The question of constructing a hybrid signcryption scheme with outside security was considered by Dent [7] . ...
Acknowledgements The author would like to thank John Malone-Lee, Liqun Chen, Fred Piper, Bodo Möller, Yevgeniy Dodis and Stéphanie Alt for their helpful comments. ...
doi:10.1007/11506157_22
fatcat:x5tqkyoasrerdeqxjbtwocnrye
Enhanced Identity-Based Signcryption System
2019
International Journal of Computer Networking Wireless and Mobile Communications
A combination of encryption and signature is a cryptosystem called traditional signcryption, wherein sender authentication is considered a key task to be verified by third party or judge. ...
The paper's objective is to analyse the security and confidentiality of message and then to integrate authentication, enforceability, forward secrecy, public verifiable along with packet mechanisms. ...
Other features of signcryption include the following: Confidentiality, Unforgeability, Integrity, and Non-repudiation and also Public verifiability and Forward secrecy of message confidentiality. ...
doi:10.24247/ijcnwmcjun20191
fatcat:4lt76fmhtbcutgz6xmzzaqjvwy
Identity-Based Hybrid Signcryption
2009
2009 International Conference on Availability, Reliability and Security
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional ...
signature-then-encryption approach. ...
Signcryption, first proposed by Zheng [22] , is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower ...
doi:10.1109/ares.2009.44
dblp:conf/IEEEares/LiST09
fatcat:qauleghiwzfure53s34tfj7wdu
Signcryption Scheme Based on SCHNORR Digital Signature
2012
International Journal of Peer to Peer Networks
The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life. ...
Part three contains the presentation of the new sygncryption scheme, Schnorr Signcryption, as a result of the combination of public key encryption and Schnorr digital signature algorithm. ...
This scheme is named Schnorr Signcryption and it implements in a single logical step both public key encryption and digital signature, offering less costs as using these two cryptographic functions individually ...
doi:10.5121/ijp2p.2012.3101
fatcat:mfloitn4krbxbekofasg3b5qx4
Signcryption scheme based on schnorr digital signature
[article]
2012
arXiv
pre-print
The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life. ...
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. ...
This scheme is named Schnorr Signcryption and it implements in a single logical step both public key encryption and digital signature, offering less costs as using these two cryptographic functions individually ...
arXiv:1202.1663v1
fatcat:cfngrkm4dzdlvhsefek4k6kmam
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
[article]
2011
arXiv
pre-print
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. ...
Several signcryption schemes are proposed throughout the years, each of them having its own problems and limitations. In this paper, the security of a recent signcryption scheme, i.e. Hwang et al.' ...
Introduction The encryption and digital signature are two fundamental cryptographic tools that can guarantee the unforgeability, integrity, and confidentiality of communications. ...
arXiv:1002.3303v3
fatcat:ragshkozy5e67gpd3blga4kqsy
A Review of Elliptic Curve based Signcryption Schemes
2014
International Journal of Computer Applications
Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-thenencryption approach. ...
This work explores the advantages and limitations of the different signcryption schemes based on elliptic curves. ...
And Unsigncryption algorithm is deterministic in nature which verifies the authenticity of signature and performs decryption. ...
doi:10.5120/17821-8769
fatcat:eentzg7llzaixjpqykgl7pvgjy
Combining Public Key Encryption with Schnorr Digital Signature
2012
Journal of Software Engineering and Applications
The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life. ...
All these algorithms offer the possibility to transmit a message over an insecure channel providing both authenticity and confidentiality. ...
Data confidentiality and data integrity are two of the most important functions of modern cryptography. ...
doi:10.4236/jsea.2012.52016
fatcat:lnmjdpret5e63atgffv6snkc7q
Chaos Based Direct Public Verifiable Signcryption Scheme
2013
IOSR Journal of Computer Engineering
The proposed scheme uses a chaos based multi key generator to generate multiple keys for signcryption scheme, and provides high security due to its chaotic nature. ...
This paper presents chaos based Multi message signcryption scheme with public verifiability concept. The proposed scheme works for both single recipient and multiple recipients. ...
Acknowledgement The author(s) would like to thank faculty members and other contributor for their very useful advises. ...
doi:10.9790/0661-1365157
fatcat:vznu5apkkzezdijkvccvstiuea
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
[article]
2012
arXiv
pre-print
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. ...
s signcryption scheme is analyzed, and it is proved that it has many security flaws and shortcomings. ...
Preliminaries to Signcryption 3) Security: Any signcryption scheme should simultaneously fulfill the security attributes of encryption and those of a digital signature. ...
arXiv:1004.3521v2
fatcat:v5unpvvcx5a4jg4xwfou62pxma
Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security
2017
International Journal of Computer Applications
In addition, multilinear map based signcryption scheme provides the confidentiality and authenticity but it is complicated for handling when number of messages gets increased rapidly. ...
rate compared to the state-of-the-art works. between secret and public key accordingly, if the secret and public keys are similar, the signature is valid or else the signature is invalid. ...
The proposed Exponentiated Multilinear Vectorized Certificateless Signcryption (EMV-CLSC) technique achieves confidentiality and authentication by combining public-key encryption and digital signatures ...
doi:10.5120/ijca2017915705
fatcat:4eqe6i6c7jcknas6d3wpimcvpa
An Efficient and Authentication Signcryption Scheme Based on Elliptic Curves
2019
MATEMATIKA
Signcryption schemes are compact and specially suited for efficiency-critical applications such as smart card dependent systems. ...
In this paper we have proposed an efficient and efficient scheme of signcryption symmetric key solutions, using elliptic curves by reducing senders computational cost. ...
Authors are thankful to the referees for their precious comments and suggestions, which are really help us to improve the quality of this article. ...
doi:10.11113/matematika.v35.n1.1042
fatcat:yo4lxzti3rgjfaafrz5pdhf5y4
Signcryption schemes with insider security in an ideal permutation model
2019
Journal of Mathematical Cryptology
Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. ...
With a careful analysis and simple tweaks, we demonstrate how different combinations of weakly secure probabilistic and deterministic encryption and signature schemes can be used to construct a strongly ...
This signcryption algorithm provides both IND-CCA and UF-CMA security in the random oracle (RO) model assuming any deterministic OW encryption (such as basic RSA) and any weakly secure deterministic signature ...
doi:10.1515/jmc-2018-0006
fatcat:2gxzb6h6gvf5fnipa47qj7mrda
« Previous
Showing results 1 — 15 out of 140 results